Sciweavers

39 search results - page 1 / 8
» Security-Typed Languages for Implementation of Cryptographic...
Sort
View
ESORICS
2005
Springer
13 years 10 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld
COMPSAC
2011
IEEE
12 years 4 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
ISCC
2007
IEEE
13 years 11 months ago
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation
Spi2Java is a tool that enables semi-automatic generation of cryptographic protocol implementations, starting from verified formal models. This paper shows how the last version o...
Alfredo Pironti, Riccardo Sisto
ICALP
2005
Springer
13 years 10 months ago
Computationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not conside...
Mathieu Baudet, Véronique Cortier, Steve Kr...
PPDP
2005
Springer
13 years 10 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...